What You’ll Learn Here.
Responsible AI Governance
Cybersecurity for AI Systems
Risk & Compliance Frameworks (NIST, ISO, AIDA)
Digital Ethics & Leadership
BLOGS
News & Articles
-
Several vulnerabilities in Google Chrome could allow arbitrary code execution
MS-ISAC NOTICE NUMBER: 2026-023 ISSUE DATE(S): 03/13/2026 PREVIEW: Several vulnerabilities have been discovered in Google Chrome, the most serious of which could allow the execution…
-
CISA adds five known exploited vulnerabilities to its catalog
CISA has added five new vulnerabilities to its Catalog of Known Exploited Vulnerabilities (KEV), based on evidence of active exploitation. CVE-2017-7921 Multiple Hikvision Products Improper…
-
Multiple vulnerabilities in Google Android operating system could allow remote code execution
Several vulnerabilities have been discovered in the Google Android operating system, the most serious of which could allow remote code execution in the context of…
-
CISA adds two known exploited vulnerabilities to its catalog
CISA has added two new vulnerabilities to its Catalog of Known Exploited Vulnerabilities (KEV), based on evidence of active exploitation. CVE-2025-49113 RoundCube Webmail Deserialization Untrusted…













